As we all know, fixing the original no-identity-sin of Internet – with verifiable identification and other credentials - is the starting point for “everything”. When organisational wallets (branded EUBW) are taken in use issuing and verifying all sorts of credentials (all the way to product passports) can be done without need for technical integra...
17 hours Transaction Banking
I had to ask Drummond Reed if ChatGPT got this right. He said: Bo, I must say, ChatGPT continues to amaze me at what it can figure out and then articulate. Yes, I believe everything it says is quite accurate. That's why my mission is to get the First Person Project the resources we need to succeed. Stay tuned! Best, =Drummond ChatGPT
30 October 2025 Innovation in Financial Services
With the EUBW work now in high gear there may not be enough attention to GLEIF. Some may think that they are competing. ChatGPT said: Excellent and timely question — and one that many in the eIDAS / Trust over IP / GLEIF / MyData / Findynet circles are quietly wrestling with right now. Let’s strip the jargon down and look at it
29 October 2025 Innovation in Financial Services
There isn’t a single, standalone protocol that everyone calls “Zero Trust Authorisation Protocol.” Zero Trust is a security architecture and mindset—“never trust, always verify”—rather than a formal RFC-defined wire protocol. What you’ll actually see in production are protocol stacks and policy engines built to enforce Zero Trust principles:
Authentication & Federation:
OIDC / OAuth 2.0 – Used for delegated auth with continuous verification.
SAML 2.0 – Older but still used in enterprises.
FIDO2/WebAuthn – Phishing-resistant, passwordless auth for Zero Trust endpoints.
Policy Decision/Enforcement:
XACML or OPA (Open Policy Agent) – Express fine-grained, attribute-based access control (ABAC).
SPIFFE/SPIRE – Secure workload identities in service meshes.
gRPC/Envoy + mTLS – For microservice-to-microservice trust with certificate rotation.
Zero Trust Frameworks/Specs:
NIST SP 800-207 – The de facto reference for Zero Trust architecture.
CNCF Zero Trust Working Groups – Define patterns for cloud-native stacks.
Google BeyondCorp – A reference implementation (not a protocol) showing continuous verification of user, device, and context.
So if you’re looking for one standardised “Zero Trust authorisation protocol,” it doesn’t exist. The industry achieves Zero Trust by composing existing protocols (OAuth 2.0 + OIDC + mTLS + ABAC/RBAC engines) under strict “verify every access, every time” policies. If you need a starting point:
NIST SP 800-207 – for architecture principles.
OAuth 2.0 + OIDC with continuous re-auth and device posture checks.
OPA or XACML for dynamic, context-aware authorisation decisions.
mTLS/SPIFFE for workload identities inside your network.
That’s the current state of play—Zero Trust is a design pattern, not a new protocol.
14 Sep 2025 17:28 Read comment
Valuable wider view: https://www.linkedin.com/posts/bo-harald-4768b51_from-ai-slop-to-signal-verifiable-provenance-activity-7362832443499773953-jdHY?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABPj1oB9_D7YNYACmHvY9HioUqpuULqZCo
20 Aug 2025 05:58 Read comment
Google Notebook crystallized here: https://www.linkedin.com/posts/bo-harald-4768b51_google-notebook-in-the-know-activity-7355968433387192321-d_ix?utm_source=share&utm_medium=member_desktop&rcm=ACoAAABPj1oB9_D7YNYACmHvY9HioUqpuULqZCo
30 Jul 2025 18:37 Read comment
Electronic invoicing
Whatever...
Transaction Banking
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.